Log4j exploit
Log4j exploit avatar

Error Warning

We have been alerted that there is a known software bug in an Apache Java module called log4j that can allow an attacker to gain access to your servers. Log4j We can confirm that we do not use log4j nor have it installed on our Apache servers, so we are not affected by the current … Read more

Internet Explorer Discontinued
Internet Explorer Discontinued avatar

IE

We pride ourselves in developing software that is browser independent, and for years we have included IE (Internet Explorer). For over 25 years, Internet Explorer remained the browser that Microsoft claimed was a core part of their early operating systems and couldn’t be disabled. Microsoft Drops Support for Internet Explorer Yesterday, Microsoft officially killed off … Read more

Two Factor Authentication
Two Factor Authentication avatar

2FA

Some clients have the requirement to secure their online web application with a two stage login, this is called two factor authentication (or sometimes 2FA), and is usually split between something you have and something you know, usually with one of the two items expiring.  Typical logons are a two stage or two screen logon … Read more

Security Upgrades: Anti Hack
Security Upgrades: Anti Hack avatar

Winston Churchill

As I posted last week, I was working on a variant of the email module for quotes, which caused an idea to develop, and some extra work, but it will improve security and performance. You see, in testing the new module, I just happened to find myself inspecting the servers logs to ensure that there … Read more